As we all know, the speed limit command and principle of the Golden wave routing network are necessary for a network to speed up the Internet access of each computer, in this way, all computers can have sufficient bandwidth for network applications. We all know that if you want to restrict a service, you must set the AC on the router to block the port used by the Service, this prevents the service from running properly. Www.2cto.com I. Port Sealing. This method can only limit the use of P2P software in a small range, and the effect is not very good. Because many P2P software can manually specify the listening port, Even if you cannot manually specify the listening port, the listening port used by the software is also relatively large, usually 0 ~ 65535. If you only browse Web pages, send and receive emails, QQ and other applications, you can disable most unnecessary ports. 2. There will be fewer Internet hosts that can be connected to by P2P hosts in the Intranet. However, P2P software applications cannot be completely restricted. You can set it in "Security Settings-IP address filtering", because the thunder server usually uses the 3076, 3077, 3078 ports to communicate with the client, so block these three ports, thunder's download speed will be much lower. The method for sealing other P2P software listening ports is similar. Www.2cto.com 3. NBAR is a technology that can dynamically search for protocols from Layer 4 to Layer 7, it can not only control the static and simple network application protocol TCP/UDP port numbers in the same way as the common ACL, but also control the protocols on which ACLs cannot achieve dynamic ports. 4. To control BT traffic, we need to support PDLM on the router, and the data packet Description Language module. It is a description of the protocol layer of high-level network applications, such as the protocol type and service port number. Its advantage is to adapt NBAR to many existing network applications, at the same time, it can also be defined to enable NBAR to support many emerging network applications, and use PDLM to limit malicious traffic on some networks. 5. restrict the number of connections to a single host. This method will limit the number of connections to all hosts on the Intranet. It is mainly used to maintain some connection entries for applications during NAT Translation Based on the Broadband Router, p2P software requires a lot of connections, and the number of connections that the Broadband Router can tolerate is limited. Therefore, when you limit the number of connections to the host, the number of connecting entries of the Broadband Router is effectively maintained. In the end, it is a relatively stupid method. This method will limit the speed of all hosts on the Intranet. The bandwidth usage status of each host is the same, and there is no advantage or disadvantage. Because the upstream bandwidth of adsl is actually very small, therefore, pay special attention to limiting the uplink bandwidth of a single machine.